Understand how D-Secure performs NIST-compliant erasure verification to ensure complete data sanitization and regulatory compliance.
D-Secure Drive Eraser software helps organizations comply with data privacy regulations such as EU-GDPR, CCPA, SOX, and HIPAA by permanently wiping data when it is no longer required or when storage devices are upgraded, repurposed, or decommissioned.
After data erasure, the software performs verification to ensure complete data sanitization, including from hidden areas such as the Host Protected Area (HPA), Device Configuration Overlay (DCO), and remapped sectors.
According to NIST 800-88 Guidelines for Media Sanitization, verification must be performed on the device to ensure that target data was effectively removed. Verifying sanitized information is an essential component of the data disposal process for maintaining confidentiality.
NIST Section 4.7 prescribes two methods to verify media sanitization:
Requires reading all values in user-accessible areas and ensuring they match the expected results. This provides complete assurance of thorough data sanitization.
Requires verifying a subset of the media device by selecting pseudorandom locations. Suitable for faster verification when handling large volumes.
NIST Section 4.7.3 states that in addition to verifying each media device individually, a randomly selected subset of sanitized media must undergo secondary verification using a different tool like D-Secure Drive Verifier. Organizations handling large-scale data destruction must incorporate secondary verification to mitigate potential data security risks.
D-Secure Drive Eraser is NIST-tested software under the Computer Forensics Tool Testing (CFTT) Federated Testing program, which verifies its overwriting capabilities. The software provides three verification options that must be selected prior to the data wiping process:
This method verifies 100% of the drive and aligns with the Full Verification approach specified in NIST 800-88 guidelines. This is the default verification method for NIST Clear and Purge standards.
This method verifies 20% of the drive and meets the requirements of Representative Sampling. While faster, this verification is advisable primarily for drives containing low-risk data.
When No Verification option is selected, only 1% of the drive is verified. This option is not recommended for sensitive data but may be suitable for specific use cases.
We highly recommend choosing Total Verification even when using standards other than NIST for wiping drives. While businesses may choose random verification to speed up the process, such verification is advisable only for drives containing low-risk data.
The verification process involves re-reading data after it has been overwritten and comparing results with the overwriting pattern used to confirm successful erasure. The software performs Block by Block and Sector by Sector comparison.
Data erasure begins using the chosen algorithm and drive type. For example, NIST Clear recommends overwriting SCSI HDD using a single pass overwrite method with a fixed value such as zeros.
Once the drive has been overwritten, the software scans the drive again to compare the overwritten data with the expected pattern.
The software checks each block and sector on the drive to ensure complete data is replaced by the overwriting pattern. If discrepancies are found between expected and actual data, the erasure process is marked as 'FAILED.'
This systematic approach ensures no data remnants are left behind, providing businesses with confidence in the data erasure process and fulfilling algorithm verification requirements.
D-Secure Drive Eraser is tested under the NIST Computer Forensics Tool Testing (CFTT) Federated Testing program. It provides verification options that align with NIST 800-88 guidelines, including Total Verification for complete drive scanning and Random Verification for representative sampling.
NIST prescribes Full Verification, which reads all values in user-accessible areas to match expected results, and Representative Sampling Verification, which verifies a subset of the media device using pseudorandom location selection.
Total Verification verifies 100% of the drive content and aligns with NIST's Full Verification approach. It is the default method for NIST Clear and Purge standards and is recommended for maximum data security assurance.
Random Verification verifies 20% of the drive and is suitable when processing large volumes of drives containing low-risk data. While faster, it provides less comprehensive assurance than Total Verification.
NIST recommends secondary software verification as an extra protection layer. Certification bodies like SERI, e-Stewards, and NAID AAA also recommend verifying erasure using a separate tool from the one used for erasure, providing independent confirmation of complete data sanitization.
Erasure verification is a vital component of the data sanitization process, ensuring sensitive information is permanently removed and irrecoverable. D-Secure incorporates NIST-recommended verification methods that empower organizations to meet regulatory compliance, mitigate risks, establish trust in data disposal processes, and achieve absolute data security.
As data privacy regulations continue to evolve, implementing a thorough erasure verification strategy will be essential for organizations looking to maintain compliance and protect their digital assets.
Your email address will not be published. Providing an email is optional.
Send us an enquiry regarding: Erasure Verification
Ensure complete data sanitization with D-Secure's verified erasure process. Meet regulatory requirements with confidence using NIST-tested software.
No comments yet. Be the first to comment.